A novel intrusion detection system for a local computer network

被引:0
|
作者
Tokhtabayev, A. [1 ]
Altaibek, A. [2 ]
Skormin, V. [1 ]
Tukeyev, U. [2 ]
机构
[1] Binghamton Univ, Binghamton, NY USA
[2] Kazakh Natl Univ, Alma Ata, Kazakhstan
关键词
decision-making under uncertainty; utility; possibility theory; inclusion index; comonotone fuzzy sets; Choquet integral;
D O I
10.1007/978-3-540-73986-9_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Local computer networks at major universities are routinely plagued by self-replicating malicious software. Due to the intensive exchange of data and information within the network, when modern viruses, worms and malicious software are introduced they propagate very quickly, leaving little or no time for human intervention. Such environments are ideal for the implementation of the automatic IDS described herein. It employs the Dynamic Code Analyzer (DCA) that detects malicious software during run time by monitoring system calls invoked by individual processes and detecting subsequences (patterns) of system calls indicative of attempted self-replication. A similar approach, also utilizing system calls, is developed for the detection of network worms. Both techniques have the potential for detecting previously unknown malicious software and significantly reducing computer resource utilization. Unfortunately, in comparison with traditional signature based antivirus software, both approaches have a much higher rate of false alarms. To address this shortcoming the authors propose a method to search for evidence of the alarm propagation within the network. This is achieved by aggregating alarms from individual hosts at a server where these alarms can be correlated, resulting in a highly accurate detection capability. Such a system, implementing the presented technology, and capable of significantly reducing the downtime of networked computers owned by students and faculty, is being implemented at the computer network at the Kazakh National University.
引用
收藏
页码:320 / +
页数:2
相关论文
共 50 条
  • [21] A Novel Host Intrusion Detection System Using Neural Network
    Lotfallahtabrizi, Parisa
    Morgan, Yasser
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 124 - 130
  • [22] A Novel Computer Network Intrusion Detection Algorithm Based on OSVM and Context Validation
    Yin, Guohang
    Zhang, Youran
    Zhao, Ziyi
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), VOL 1, 2016, : 591 - 595
  • [23] Design of the Computer Intrusion Detection System
    Liu, Hui
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 747 - 751
  • [24] Computer network intrusion detection software development
    Hashim, SJ
    Jumari, K
    Ismail, M
    Elektrik, JK
    Sistem, ED
    Kejuruteraan, F
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B117 - B123
  • [25] A Novel Method for Network Intrusion Detection
    Wang, Hongmin
    Wei, Qiang
    Xie, Yaobin
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [26] Computer Network Intrusion Anomaly Detection with Recurrent Neural Network
    Fu, Zeyuan
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [27] Recurrent network in Network Intrusion Detection System
    Xue, JS
    Sun, JZ
    Zhang, X
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2676 - 2679
  • [28] Novel immune system model and its application to network intrusion detection
    Ling, Jun
    Cao, Yang
    Yin, Jian-Hua
    Huang, Tian-Xi
    Wuhan University Journal of Natural Sciences, 2003, 8 (2 A) : 393 - 398
  • [30] Novel Intrusion Detection System integrating Layered Framework with Neural Network
    Srivastav, Nidhi
    Challa, Rama Krishna
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 682 - 689